期刊名称:International Journal of Innovative Research in Computer and Communication Engineering
印刷版ISSN:2320-9798
电子版ISSN:2320-9801
出版年度:2017
卷号:5
期号:7
页码:13243
DOI:10.15680/IJIRCCE.2017.0507050
出版社:S&S Publications
摘要:In current world situation involved many type of attacker to steal your own data for purpose of money,hobby and revenge. In this paper how to secure and transfer the data also found the minimum distance to reach thedestination .we use two techniques to prohibit the attacker, 1) RFD (route flap dumping) and 2) MRAI (minimum routeadvertisement interval) this worked are find who is the hacker and how unaccepted the link furthermore and generalthings are used to transfer the data is internet protocol, border gateway protocol(BGP), path vector protocol, distancevector protocol, routers, autonomous system(AS), latitude, longitude and MED etc. It consist as AS-PATH, path cost,PID, key .The border gateway protocol is used to transfer the data one AS system to another. It provide the best featureof ibgp (ingress) and ebgp (egress) .RFD and MRAI use routing table and times tamper to calculate the distance of pathand path changes, suddenly inform to neighbor AS system.